19.06.2014 Views

Conseils sur l'utilisation du protocole TLS - Centre de la sécurité des ...

Conseils sur l'utilisation du protocole TLS - Centre de la sécurité des ...

Conseils sur l'utilisation du protocole TLS - Centre de la sécurité des ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

November 2008 ITSB-60 novembre 2008<br />

services/cmv-program-e.html<br />

Cryptographic Algorithm Validation<br />

Program (CAVP)<br />

The CAVP validates commercial<br />

cryptographic algorithm implementations as<br />

meeting the requirements of its specified<br />

standard or NIST special publication.<br />

In the CAVP, vendors of commercial<br />

cryptographic algorithm implementations<br />

use in<strong>de</strong>pen<strong>de</strong>nt and accredited <strong>la</strong>boratories<br />

to have their mo<strong>du</strong>les tested.<br />

http://csrc.nist.gov/groups/STM/cavp/in<strong>de</strong>x.<br />

html<br />

FIPS 140-2<br />

This standard specifies the security<br />

requirements for cryptographic mo<strong>du</strong>les.<br />

http://csrc.nist.gov/publications/fips/fips140-<br />

2/fips1402.pdf<br />

mo<strong>du</strong>les cryptographiques commerciaux font<br />

appel à <strong>de</strong>s <strong>la</strong>boratoires indépendants et accrédités<br />

pour faire tester leurs mo<strong>du</strong>les.<br />

http://www.cse-cst.gc.ca/services/in<strong>du</strong>strialservices/cmv-program-f.html<br />

Cryptographic Algorithm Validation Program<br />

(CAVP)<br />

Le CAVP vali<strong>de</strong> les mises en oeuvre<br />

d’algorithmes cryptographiques commerciaux qui<br />

satisfont aux exigences <strong>de</strong>s normes précisées ou<br />

<strong>de</strong>s publications spéciale <strong>du</strong> NIST.<br />

Dans le cadre <strong>du</strong> CAVP, les fournisseurs <strong>de</strong> mises<br />

en oeuvre d’algorithmes cryptographiques<br />

commerciaux font appel à <strong>de</strong>s <strong>la</strong>boratoires<br />

indépendants et accrédités pour faire tester leurs<br />

mo<strong>du</strong>les.<br />

http://csrc.nist.gov/groups/STM/cavp/in<strong>de</strong>x.html<br />

FIPS 140-2<br />

Cette norme énonce les exigences <strong>de</strong> sécurité pour<br />

les mo<strong>du</strong>les cryptographiques.<br />

http://csrc.nist.gov/publications/fips/fips140-<br />

2/fips1402.pdf<br />

Contacts and Assistance<br />

Head, IT Security Client Services<br />

Communications Security Establishment<br />

Canada<br />

PO Box 9703, Terminal<br />

Ottawa, ON K1G 3Z4<br />

Telephone: (613) 991-8495<br />

e-mail : client.services@cse-cst.gc.ca<br />

Ai<strong>de</strong> et renseignements<br />

Chef, Services à <strong>la</strong> clientèle <strong>de</strong> <strong>la</strong> Sécurité <strong>de</strong>s TI<br />

<strong>Centre</strong> <strong>de</strong> <strong>la</strong> sécurité <strong>de</strong>s télécommunications Canada<br />

C.P. 9703, Terminus<br />

Ottawa (Ontario) K1G 3Z4<br />

Téléphone : (613) 991-8495<br />

Courriel : client.services@cse-cst.gc.ca<br />

La directrice <strong>de</strong> <strong>la</strong> Gestion <strong>de</strong> <strong>la</strong> mission <strong>de</strong> <strong>la</strong> Sécurité <strong>de</strong>s TI,<br />

______________________________________<br />

Gwen Beauchemin<br />

Director, IT Security Mission Management<br />

12

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!